Preferred Language
Articles
/
jeasiq-1270
Using Artificial Neural Network Models For Forecasting & Comparison
...Show More Authors

The Artificial Neural Network methodology is a very important & new subjects that build's the models for Analyzing, Data Evaluation, Forecasting & Controlling without depending on an old model or classic statistic method that describe the behavior of statistic phenomenon, the methodology works by simulating the data to reach a robust optimum model that represent the statistic phenomenon & we can use the model in any time & states, we used the Box-Jenkins (ARMAX) approach for comparing, in this paper depends on the received power to build a robust model for forecasting, analyzing & controlling in the sod power, the received power come from the generation state company & to be considered as Exogenous variables to two methodologies, the sales activity in the General Company of Baghdad Electricity Distribution divides it's work to three stages:

  • Account the Sold Power.
  • Account the Value of the Sold Power.
  • Account the Cash Received.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Jul 29 2020
Journal Name
Iraqi Journal Of Science
A Descent Modification of Conjugate Gradient Method for Optimization Models
...Show More Authors

In this paper, we suggest a descent modification of the conjugate gradient method which converges globally provided that the exact minimization condition is satisfied. Preliminary numerical experiments on some benchmark problems show that the method is efficient and promising.  

View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Forecasting Cryptocurrency Market Trends with Machine Learning and Deep Learning
...Show More Authors

Cryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Jun 30 2009
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Application of Neural Network in the Identification of the Cumulative Production from AB unit in Main pays Reservoir of South Rumaila Oil Field.
...Show More Authors

A common field development task is the object of the present research by specifying the best location of new horizontal re-entry wells within AB unit of South Rumaila Oil Field. One of the key parameters in the success of a new well is the well location in the reservoir, especially when there are several wells are planned to be drilled from the existing wells. This paper demonstrates an application of neural network with reservoir simulation technique as decision tool. A fully trained predictive artificial feed forward neural network (FFNNW) with efficient selection of horizontal re-entry wells location in AB unit has been carried out with maintaining a reasonable accuracy. Sets of available input data were collected from the exploited g

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 31 2011
Journal Name
Al-khwarizmi Engineering Journal
Back stepping-Based-PID-Controller Designed for an Artificial Pancreas model
...Show More Authors

Artificial pancreas is simulated to handle Type I diabetic patients under intensive care by automatically controlling the insulin infusion rate. A Backstepping technique is used to apply the effect of PID controller to blood glucose level since there is no direct relation between insulin infusion (the manipulated variable) and glucose level in Bergman’s system model subjected to an oral glucose tolerance test by applying a meal translated into a disturbance. Backstepping technique is usually recommended to stabilize and control the states of Bergman's class of nonlinear systems. The results showed a very satisfactory behavior of glucose deviation to a sudden rise represented by the meal that increase the blood glucose

 

... Show More
View Publication Preview PDF
Publication Date
Fri Oct 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of some of reliability and Hazard estimation methods for Rayleigh logarithmic distribution using simulation with application
...Show More Authors

The question of estimation took a great interest in some engineering, statistical applications, various applied, human sciences, the methods provided by it helped to identify and accurately the many random processes.

In this paper, methods were used through which the reliability function, risk function, and estimation of the distribution parameters were used, and the methods are (Moment Method, Maximum Likelihood Method), where an experimental study was conducted using a simulation method for the purpose of comparing the methods to show which of these methods are competent in practical application This is based on the observations generated from the Rayleigh logarithmic distribution (RL) with sample sizes

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2014
Journal Name
Journal Of The College Of Languages (jcl)
The Influence of Manipulating the Virtual Library in Comparison with the Individual Learning via Computer Use in English Language
...Show More Authors

The study aims at investigating the effectiveness of the Virtual Library Technology, in developing the achievement of the English Language Skills in the Center of Development and Continuous Education, in comparison with the individual learning via personal computer to investigate the students' attitude towards the use of both approaches. The population of the study includes the participants in the English Language course arranged in the Center. The sample includes 60 students who were randomly chosen from the whole population (participants in English Courses for the year 2009-2010). The sample is randomly chosen and divided into two experimental groups. The first group has learned through classroom technology; while the other group has l

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
I-manager’s Journal On Communication Engineering And Systems
SOLVING NETWORK CONGESTION PROBLEM BY QUALITY OF SERVICE ANALYSIS USING OPNET
...Show More Authors

Among many problems that reduced the performance of the network, especially Wide Area Network, congestion is one of these, which is caused when traffic request reaches or exceeds the available capacity of a route, resulting in blocking and less throughput per unit time. Congestion management attributes try to manage such cases. The work presented in this paper deals with an important issue that is the Quality of Service (QoS) techniques. QoS is the combination effect on service level, which locates the user's degree of contentment of the service. In this paper, packet schedulers (FIFO, WFQ, CQ and PQ) were implemented and evaluated under different applications with different priorities. The results show that WFQ scheduler gives acceptable r

... Show More
Publication Date
Fri Aug 28 2015
Journal Name
Al-khwarizmi Engineering Journal
wavelength division multiplexing passive optical network modelling using optical system simulator
...Show More Authors

Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The simulation shows the behavior of optical

... Show More
Preview PDF
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Wavelength Division Multiplexing Passive Optical Network modeling Using Optical System Simulator
...Show More Authors

Abstract

Due to the continuing demand for larger bandwidth, the optical transport becoming general in the access network. Using optical fiber technologies, the communications infrastructure becomes powerful, providing very high speeds to transfer a high capacity of data. Existing telecommunications infrastructures is currently widely used Passive Optical Network that apply Wavelength Division Multiplexing (WDM) and is awaited to play an important role in the future Internet supporting a large diversity of services and next generation networks. This paper presents a design of WDM-PON network, the simulation and analysis of transmission parameters in the Optisystem 7.0 environment for bidirectional traffic. The sim

... Show More
View Publication
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Encryption Symmetric secret Key in Wireless Sensor Network Using AES Algorithm
...Show More Authors

      Wireless sensor network (WSN) security is an important component for protecting data from an attacker. For improving security, cryptography technologies are divided into two kinds: symmetric and asymmetric. Therefore, the implementation of protocols for generating a secret key takes a long time in comparison to the sensor’s limitations, which  decrease network throughput because they are based on an asymmetric method. The asymmetric algorithms are complex and decrease network throughput. In this paper, an encryption symmetric secret key in wireless sensor networks (WSN) is proposed. In this work, 24 experiments are proposed, which are encryption using the AES algorithm in the cases of 1 key, 10 keys, 25 keys, and 50 keys. I

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref